Applied Cryptography : Protocols, Algorithms, and Source Code in C by Bruce Schneier (1995, Trade Paperback)

solr_books (24098)
98.6% positive feedback
Price:
US $10.77
ApproximatelyAU $16.74
+ $31.48 postage
Estimated delivery Mon, 26 May - Wed, 4 Jun
Returns:
30-day returns. Buyer pays for return postage. If you use an eBay postage label, it will be deducted from your refund amount.
Condition:
Like new
You are purchasing a Like New copy of 'Applied Cryptography: Protocols, Algorithms, and Source Code in C'. Condition Notes: This book is in Like New condition.

About this product

Product Identifiers

PublisherWiley & Sons, Incorporated, John
ISBN-100471117099
ISBN-139780471117094
eBay Product ID (ePID)718395

Product Key Features

Number of Pages792 Pages
Publication NameApplied Cryptography : Protocols, Algorithms, and Source Code in C
LanguageEnglish
Publication Year1995
SubjectCommunication Studies, Security / Cryptography, Security / General, Telecommunications
TypeTextbook
Subject AreaComputers, Technology & Engineering, Language Arts & Disciplines
AuthorBruce Schneier
FormatTrade Paperback

Dimensions

Item Height1.6 in
Item Weight40.8 Oz
Item Length9.2 in
Item Width7.2 in

Additional Product Features

Edition Number2
Intended AudienceTrade
LCCN95-012398
Reviews"the definitive publicly available text on the theory and practice of cryptography" (Computer Shopper, January 2002)
Dewey Edition20
IllustratedYes
Dewey Decimal005.8/2
Table Of ContentPartial table of contents: CRYPTOGRAPHIC PROTOCOLS. Protocol Building Blocks. Basic Protocols. Intermediate Protocols. Advanced Protocols. Esoteric Protocols. CRYPTOGRAPHIC TECHNIQUES. Key Length. Key Management. Algorithm Types and Modes. Using Algorithms. CRYPTOGRAPHIC ALGORITHMS. Data Encryption Standard (DES). Other Block Ciphers. Other Stream Ciphers and Real Random-Sequence Generators. Public-Key Algorithms. Special Algorithms for Protocols. THE REAL WORLD. Example Implementations. Politics. SOURCE CODE.source Code. References.
Synopsis". . .the best introduction to cryptography I've ever seen. . . .The book the National Security Agency wanted never to be published. . . ." -Wired Magazine ". . .monumental . . . fascinating . . . comprehensive . . . the definitive work on cryptography for computer programmers . . ." -Dr. Dobb's Journal ". . .easily ranks as one of the most authoritative in its field." -PC Magazine ". . .the bible of code hackers." -The Millennium Whole Earth Catalog This new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography-the technique of enciphering and deciphering messages-to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this new edition shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems. What's new in the Second Edition? * New information on the Clipper Chip, including ways to defeat the key escrow mechanism * New encryption algorithms, including algorithms from the former Soviet Union and South Africa, and the RC4 stream cipher * The latest protocols for digital signatures, authentication, secure elections, digital cash, and more * More detailed information on key management and cryptographic implementations, ". . .the best introduction to cryptography I've ever seen. . . .The book the National Security Agency wanted never to be published. . . ." -Wired Magazine ". . .monumental . . . fascinating . . . comprehensive . . . the definitive work on cryptography for computer programmers . . ." -Dr. Dobb's Journal ". . .easily ranks as one of the most authoritative in its field." -PC Magazine ". . .the bible of code hackers." -The Millennium Whole Earth Catalog This new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography-the technique of enciphering and deciphering messages-to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this new edition shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems. What's new in the Second Edition? ∗ New information on the Clipper Chip, including ways to defeat the key escrow mechanism ∗ New encryption algorithms, including algorithms from the former Soviet Union and South Africa, and the RC4 stream cipher ∗ The latest protocols for digital signatures, authentication, secure elections, digital cash, and more ∗ More detailed information on key management and cryptographic implementations, ". . . the best introduction to cryptography I've ever seen. . . . The book the National Security Agency wanted never to be published. . . . " -Wired Magazine ". . . monumental. . . fascinating. . . comprehensive. . . the definitive work on cryptography for computer programmers. . . " -Dr. Dobb's Journal ". . ., ." . .the best introduction to cryptography I've ever seen. . . .The book the National Security Agency wanted never to be published.. . ." -Wired Magazine ." . .monumental . . . fascinating . . . comprehensive . . . thedefinitive work on cryptography for computer programmers . . ."-Dr. Dobb's Journal ." . .easily ranks as one of the most authoritative in its field."-PC Magazine ." . .the bible of code hackers." -The Millennium Whole EarthCatalog This new edition of the cryptography classic provides you with acomprehensive survey of modern cryptography. The book details howprogrammers and electronic communications professionals can usecryptography-the technique of enciphering and decipheringmessages-to maintain the privacy of computer data. It describesdozens of cryptography algorithms, gives practical advice on how toimplement them into cryptographic software, and shows how they canbe used to solve security problems. Covering the latestdevelopments in practical cryptographic techniques, this newedition shows programmers who design computer applications, networks, and storage systems how they can build security intotheir software and systems. What's new in the Second Edition? * New information on the Clipper Chip, including ways to defeat thekey escrow mechanism * New encryption algorithms, including algorithms from the formerSoviet Union and South Africa, and the RC4 stream cipher * The latest protocols for digital signatures, authentication, secure elections, digital cash, and more * More detailed information on key management and cryptographicimplementations
LC Classification NumberQA76.9.A25S35 1996

All listings for this product

Buy It Now
Any condition
New
Pre-owned

Ratings and reviews

4.8
4 product ratings
  • 3 users rated this 5 out of 5 stars
  • 1 users rated this 4 out of 5 stars
  • 0 users rated this 3 out of 5 stars
  • 0 users rated this 2 out of 5 stars
  • 0 users rated this 1 out of 5 stars

Would recommend

Good value

Compelling content

Most relevant reviews

  • Old, but still relevant.

    This book is directed at people who implement crypto. It's more for engineers than for academics. Most of us should know better than to make our own implementations of crypto algorithms. Today, it makes more sense to use tried-and-true libraries than to reinvent the wheel. I wouldn't use the book for its original purpose, but I still find it quite relevant to understand the basic concepts (and some history). It is highly dated. In 1996, the world was different. DES was still quite used, and the Clipper Chip was a current threat. Nobody talked about AES/Rijndael, and MD5 was already suspected to be insecure, though not yet as blatantly as today. This is not a good reference on how to do crypto in 2017. This is a good reference on what crypto is, what the basic concepts are about, and how they work. Buy this book if you are entering the world of crypto and want to have a holistic view of what it is about (symmetric/public-key cryptography; hashes; MACs; secret sharing, digital certificates, even digital cash.....). Do not buy this book if you need to learn current-day algorithms like AES or SHA-2 (SHA-1 is included, and considered secure back then). I found the book still worth my time and money. I'm now looking for similar, but updated books, and for the mathematical aspects of cryptography, I recommend Dan Boneh's (incredibly difficult) cryptography course in Coursera. All together, they are hard to beat. Do not focus all your energy on this book - but don't disregard it either.

    Verified purchase: YesCondition: Pre-owned

  • thanks

    thanks

    Verified purchase: YesCondition: Pre-owned